Chapter 1 Flashcards

1
Q

Keeping data, software, and hardware secure against unauthorized access, use, disclosure, disruption, modification, or destruction.

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The requirements that are set forth by laws and industry regulations

A

Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

C.I.A.

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Allowing only those authorized to access the data requested

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Keeping data unaltered by Accidental or Malicious intent

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The ability to access data when needed

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The physical disposition of the media on which the data is stored

A

Possession/Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Allows you to say whether you’ve attributed the data in question to the proper owner or creator

A

Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How useful the data is

A

Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attacks that allow unauthorized users to access your data, applications, or environments, and are primarily an attack against confidentiality

A

Interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attacks that cause our assets to become unusable or unavailable for our use, on a temporary or permanent basis.

A

Interruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attacks that involve tempering with assets.

A

Modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attacks that involve generating data, processes, communications, or other similar activities with a system.

A

Fabrication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The likelihood that an event will occur

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Events that could cause damage to assets

A

Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A weakness that a threat event of the threat agent can take advantage of

A

Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An additional step that is taking into account the value of the asset being threatened

A

Impact

18
Q

Protecting the physical environment in which your system sits, or where your data is stored.

A

Physical Control

19
Q

Protects the systems, networks, and environments that process, transmit, and store your data

A

Technical/Logical Control

20
Q

Dictate how users of your environment should behave and are based on rules, laws, policies, procedures and guidelines

A

Administrative Control

21
Q

A model that adds three more principles to the CIA triad.

A

Parkerian Hexad

22
Q

Three principles added to the C.I.A.by the Parkerian Hexad

A

Possession/Control
Utility
Authenticity

23
Q

Forecasting and evaluation of financial risks together with the identification of procedures to avoid or minimize their impact.

A

Risk Management

24
Q

Risk Management Processes

A

Identify Assets
Identify Threats
Assess Vulnerability
Assess Risks
Mitigate Risks

25
Q

Identifying and categorizing the assets that we are protecting

A

Identify Assets

26
Q

Identify and categorize the threats that affect the assets. (Once the critical assets have been found)

A

Identify Threats

27
Q

Any given asset may have thousands or millions of threats that could impact it. It is important to ___________ _____________ in the form of potential threats.

A

Assess Vulnerabilities

28
Q

We ______ ________ once we have identified the the threats and vulnerabilities for a given asset.

A

Assess Risks

29
Q

Putting measures in place to help ensure that a given type of threat is accounted for.

A

Mitigate Risks

30
Q

Measures used to alleviate risk

A

Control

31
Q

Controls are divided into three categories

A

Physical
Logical
Administrative

32
Q

When risk management practices have failed and have caused an inconvenience to a disastrous event, you follow through with _____________

A

Incident Response

33
Q

Incident Response Cycle steps

A

Preparation
Detection and Analysis
Containment
Eradication
Recovery
Post Incident Activity

34
Q

Consists of all the activities you can perform ahead of time to better handle an incident

A

Preparation

35
Q

This is where the action begins. You detect an issue, decide whether it’s actually an incident, and respond to it appropriately.

A

Detection and Analysis

36
Q

Taking steps to ensure that the situation does not cause any more damage than it already has, or to at least lessen any ongoing harm

A

Containment

37
Q

The attempt to remove the effects of an issue from our environment

A

Eradication

38
Q

Restoring devices or data from backup media, rebuilding systems, or reloading applications. Going back to a certain state you were in prior to the indident

A

Recovery

39
Q

When we attempt to determine specifically what happened, why it happened, and what we can do to keep it form happening again

A

Post-Incident Activity

40
Q

Latin for after death

A

post-mortem